Blog Alerts, News, Tech and Training

 

 

Normally $149, SAVE 40%  NOW $89 – (Limit 3 per customer) Limited Time and Stocks – To order Contact Us
(Note:
You may find cheaper devices however they may only come with 1 or NO QC ports)

  • Quick Charge 3.0 USB Charging Dock: 2 QC3.0 charging ports, will fast charge QC2.0/3.0 compatible devices (e.g. Samsung Galaxy S7, Note 5 etc.) Quick Charge 3.0 charges devices up to 80% in just 35 minutes, 4 times quicker than conventional charger. And backwards compatible with Quick Charge 1.0 & 2.0
  • Charging Station for Multiple Devices: Charges up to 10 USB powered devices simultaneously, especially support 8 iPads at once. Rapid charging with BC1.2 technology, provides up to 5V2.4A of power per port. Hold your iPad, iPhone, smartphones, tablets and other devices all in one place and keep your device nice organized
  • Detachable Dividers: adjust width easily to any size you need, hold your ipad or iphone even they are in the cases and prevent your devices from being scratched. Besides, high quality dividers of varying heights: taller dividers for larger devices like iPad and tablets, short dividers for iPhone and kindle
  • Certified Safety: UL certification and UNITEK’s Multi-Protect safety system ensure complete protection for you and your devices. Protection again over-charging, over-heating, over-voltage and short circuit. Surge protection keep your appliances safe. LED display status
  • What We offer: 1-year warranty quality guarantee, with friendly customer service and email support

 

Whats in the box

 

*USB Cables or Freight not included.

We are often asked , “Should I go NBN for my business? Its cheap and fast!”

We are finding many business being cold-called for NBN solutions. Even though these sound quite low cost, in many areas, it isn’t much different to ADSL. Some cold callers will use scare tactics to force you into making a rash decision.

Often being told

  • they guarantee speeds, which is untrue (except with NBN business grade services, and at the time of writing are not offered in all areas)
  • that copper will be ripped out soon and unless upgrade now will have no internet or phones.
  • no other option but NBN for internet because of the fibre (untrue, we offer fixed wireless , not 4G but business grade, services)

Sterling IT have taken these cold calls and have informed the ‘sales person’ that these claims are untrue and need to be very careful with these sales tactics.
One of the biggest advantages on NBN over ADSL is the upload speeds. They are after 10-20 times faster than ADSL. However, with the download speeds, even at 25 or 50Mbps claimed speeds, many clients are not achieving these at the moment.

Another BIG issue for business is the SLA (“Service Level Agreement”) – Unlike a business grade connection of 99.99% uptime, NBN SLAs are generally lower, meaning longer outages without claim. We actually had one client out (during the sale of their business) down for 1 week because of NBN. They had 2x NBN connections, one for backup, and both NBN connections went down.

Smart company article : Take a READ HERE

It is always recommended to (1) Have a business grade connection; (2) Have a cheap backup connection on a different technology (eg wireless if main one is wired and vice versa)

Sterling IT is able to offer all types of services (including NBN) , however our recommendations are based on location, costs, service, dependence on internet plus many other factors.
Get professional advice from your trusted IT advisor on what is best for your business. Please do not make price your first choice. We have seen too many bad decisions because of this and businesses lose thousands of dollars in sales and productivity.

If you would like a FREE site quality check or a review on your current connection, please let us know.
Even if in contract, we are happy to discuss and provide a free review.

Is your RDS / TS server running slow when only a couple of people are logged in?
Do you find things such as printers stop working for no reason but a restart fixes this?

We sometimes get these question and it is related to how users EXIT their Remote Desktop Services (RDS or RDP) and Terminal Services sessions. There are two options when closing a client session: you can either “Sign Out/Log Off” or “Disconnect“.

Sign Out/Log Off – Ends the session running on the remote computer or server. Any applications running within the session will be closed and unsaved changes made to open files will be lost. The next time you log onto the remote computer or server, a new FRESH session is created and printers restored.

Disconnect – Leaves the session running on the remote computer or server. You can reconnect to the remote computer or server and resume the session. This is good if switching computers or if you are running a time consuming task , you can start the task and disconnect from the session. Later, you can log back onto the remote computer or server, reenter the session, and check the results.

What are our recommendations?
A: To ALWAYS SIGN OUT or LOG OFF.  Even if going to lunch as whilst you are disconnected, other users are being slowed down due to your session taking up unnecessary resources.
It will also refresh the memory for that session as well (especially with Google Chrome)

Show me the differences?

After searching high and low, I thought I would share some commands that will allow you to find all active DHCP servers on your network.

There is software like FIND DHCP SERVER however there are some incompatibilities we have found on some operating systems.

Temporarily disable your production DHCP server and see if other servers respond.

You can get the IP address of the server by running ipconfig /all on a windows machine, and then you can get the MAC address by looking for that IP address using arp -a.

Running a simple COMMAND PROMPT in windows and the command line : ipconfig /all | find /i “DHCP Server”

You will be granted with the following results.

How to find a dhcp server

Note that you can replace DHCP SERVER with SERVER and it will display all servers on the network.

IMPORTANT NOTE: Your IP must be set by DHCP to retrieve this information otherwise it will not show up. Also this command will show even virtual NIC DHCP servers as well.

 

iphone-in-fish-tank

(firstly I thought the picture to be appropriate considering this true story)

You might laugh at me but I was having a nanny nap with my son, and as I was drifting off, I went to put the phone on his bedside table.

I realized that the table should have been lower than where my hand stopped and then fully waking and realizing, I was putting the phone into a fish tank.
Being so tired, I put the phone down and didn’t even turn it off. (which that should be the first thing you do with water damage).

When I woke in the morning it would not turn on (even though about 80% battery left) – there was still water dripping out of power and sound buttons (not good!)
Plugged in the power and turned on but kept rebooting so I quickly powered back off.

Stuck the phone in rice for a few hours and still no good. Even got a heat gun over the phone.

This is where it went well and this is 12 hours after the incident. I then proceeded to get an air compressor and blow out any water I could (without pulling apart).
The touch screen become a little responsive but started rebooting again. I even had MORE water marks and streaks on the LCD between the touchscreen and LCD (internal)

Now this is the fix for a water damaged iPhone which might even work on Android/Samsung but not tested.
I could get the water dried, it wasn’t a hot day either. So I placed the phone on the dashboard of the car, closed all windows and got the phone as hot as possible.

After a couple of hours I went to the car and tried turning it on…. Guess what – it said TEMPERATURE TOO HOT… I thought good, lets leave it there for most of the day.

Went back 4 hours later, not only did it turn on, the screen was working perfect and even better, all the water streaks were gone. Its just like the new screen I paid $200 for 2 weeks ago on teh same phone.

Hopefully this will help someone else.

(PS I am extremely careful with my phones, and in 3 years, two incidents in two weeks… Argh!)

easy-password-to-crack

This topic comes up quite a fair bit some some clients. They do not realise the risk of having simple passwords until it’s too late.

It also means people can be looking at your data without even knowing.

We recommend passwords at a minimim to be 6 characters (however we recommend 8) , and also to have upper, lower, alphanumber and special characters in the password.
The password %^@gtgTT is easier to crack than aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa

The reason is only because of length not complexity.
Here is some examples of weak passwords used in 2015.

To see how hard it is to crack your password, click this link and it will take you external to our site using a calculator to see how long it takes.

windows-menu-sterling

With Windows 8/8.1 this process was quite difficult and if running Windows 8/8.1, we recommend upgrading before July 29th 2016 to get free upgrade

Now, you can simply open the Settings app, navigate to Personalization > Colors, and activate the “Show color on Start, taskbar, action center, and title bar” option.
You can also choose the color you want to use from the Colors screen.

Simple.

petya_ransomware

This Petya ransomware will kill the Master Boot Record making your hard disk useless. If this fails, it will then run a file-encypting program

Petya is an unusual ransomware threat that first popped up on security researchers’ radar in March. Instead of encrypting a user’s files directly, it encrypts the master file table (MFT) used by NTFS disk partitions to hold information about file names, sizes and location on the physical disk.

Before encrypting the MFT, Petya replaces the computer’s master boot record (MBR), which contains code that initiates the operating system’s bootloader. Petya replaces it with its own malicious code that displays the ransom note and leaves computers unable to boot.

However, in order to overwrite the MBR after it infects a computer, the malware needs to obtain administrator privileges. It does so by asking users for access via the User Account Control (UAC) mechanism in Windows.

In previous versions, if Petya failed to obtain administrator privileges, it stopped the infection routine. However, in such a case, the latest variant installs another ransomware program, dubbed Mischa, that begins to encrypt users’ files directly, an operation that doesn’t require special privileges.

The ransom that Mischa currently asks is approx 2 bitcoins, or around US$900

Another thing that sets Mischa apart is that it encrypts executable (.EXE) files in addition to documents, pictures, videos and other user-generated files typically targeted by ransomware programs. This has the potential to leave installed programs and the OS in a non-functional state, making it harder to pay the ransom from the affected system.

The installer for the Petya-Mischa combo is distributed via spam emails that pose as job applications.
These emails contain a link to an online file storage service that hosts a picture of the alleged applicant and a malicious executable file that masquerades as a PDF document.

If it’s downloaded and executed, the fake PDF file first tries to install Petya and if that fails, it installs Mischa.
There is currently no known way to restore files encrypted by Mischa without paying the ransom.

 

 

Chat with an experienced consultant